The cybersecurity landscape faces a mounting threat as the Akira ransomware group intensifies operations, marking a significant evolution since its emergence in March 2023. This sophisticated threat actor specializes in leveraging compromised credentials to access vulnerable VPN services lacking multi-factor…
Tag: Cyber Security News
Cybersecurity Metrics That Matter for Board-Level Reporting
In today’s digital-first business environment, cyber threats are not just an IT problem they’re a core business risk. Board members are increasingly expected to oversee cybersecurity strategy, but they often lack the technical background to interpret traditional security reports. This…
Protecting Against Insider Threats – Strategies for CISOs
In the modern enterprise, cybersecurity is no longer just a technical concern it is a boardroom priority. The frequency and impact of cyber incidents have escalated, placing organizational resilience, regulatory compliance, and business reputation at risk. Board members, however, often…
New Phishing Attack Appending Weaponized HTML Files Inside SVG Files
Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver malicious HTML content to unsuspecting victims. This emerging threat, first observed at the beginning of 2025, represents a notable evolution…
VibeScamming – Hackers Using AI Tools to Generate Phishing Ideas & Working Models
In a concerning evolution of cybercrime, security researchers have identified a new threat known as “VibeScamming” – where malicious actors leverage generative AI to create sophisticated phishing campaigns with minimal effort. This technique, inspired by the concept of “VibeCoding” (using…
28-Year-Old Lost 2 Lakhs by Just Downloading Image in WhatsApp
A 28-year-old man from Maharashtra became the latest victim of a sophisticated WhatsApp scam. Pradeep Jain, unsuspecting and going about his daily routine, lost over Rs 2 lakh from his bank account—all because he downloaded a single image sent by an…
Windows Defender Policies Bypassed Using WinDbg Preview via Microsoft Store
A significant vulnerability in Windows Defender Application Control (WDAC) implementations, demonstrating how attackers can circumvent strict security policies through Microsoft’s own debugging tool. The exploit leverages WinDbg Preview, available through the Microsoft Store, to inject malicious code into legitimate processes,…
Threat Actors Allegedly Selling Baldwin Killer That Bypasses AV & EDR
A sophisticated malware tool dubbed “Baldwin Killer” is reportedly being marketed on underground forums as a powerful solution for bypassing antivirus (AV) and endpoint detection and response (EDR) security products. Security researchers have identified a forum listing offering this tool…
Ransomware Attack on Banks Costs an Average of $6.08 Million Along With Downtime & Reputation Loss
Financial institutions worldwide are facing unprecedented ransomware threats, with new data revealing the staggering economic impact these attacks inflict. In 2024, the average cost of data breaches in the banking sector has reached $6.08 million per incident, marking a 10%…
Bypassing AVs and EDRs With New Command-Line Obfuscation Technique
Researchers have uncovered advanced command-line obfuscation methods that allow attackers to bypass detection systems such as antivirus (AV) and endpoint detection and response (EDR) platforms. The techniques, detailed in a comprehensive study released on March 24, 2025, exploit parsing inconsistencies…